Browse > Article

Strong Password Mutual Authentication Protocol  

Yoon, Eun-Jun (School of Electrical Engineering and Computer Science, Kyungpook National University)
Hong, You-Sik (School of Computer Engineering, Sangji University)
Kim, Cheon-Shik (Dept. of Liberal Arts, Anyang University)
Yoo, Kee-Young (Dept. of Computer Engineering, Kyungpook National University)
Publication Information
Abstract
Recently, user authentication is the most important part as far as security to provide confidentiality and integrity over untrusted networks like the Internet. Especially, password-based user authentication method is the most widely-used user authentication method due to various advantages, such as human-memorable simplicity, convenience, mobility, low-cost operations and efficiency. In this paper, we propose a new strong password mutual authentication protocol. As a result, the proposed authentication protocol provides more security and efficiency compare with the previously related protocols. So that, it can be used practically as the Internet authentication protocol.
Keywords
네트워크 보안;패스워드;상호인증;암호 프로토콜;인터넷;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 M. S. Hwang, 'Cryptanalysis of remote login authentication scheme,' Computer Communications, Vol. 22, no. 8, pp. 42-744, 1999   DOI   ScienceOn
2 C.W. Lin, J.J. Shen, and M.S.Hwang, 'Security enhancement for optimal strong- password authentication protocol,' ACM Operating Systems Review, Vol. 37, no. 2, April 2003
3 이규환, 이주화, 김재현, '무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜,' 전자공학회논문지, 제44권, 제TC-5호, pp. 54-62, 2007   과학기술학회마을
4 C. K. Chan and L. M. Cheng, 'Cryptanlysis of timestamp-based password authentication scheme,' Computers & Security, Vol. 21, no. 1, pp. 74-76, 2002   DOI   ScienceOn
5 Y. L. Tang, M. S. Hwang, and C. C. Lee, 'A simple remote user authentication scheme. Mathematical and Computer Modelling,' Vol. 36, pp. 103-107, 2002   DOI   ScienceOn
6 김천식, 윤은준, 홍유식, 문남미, '이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술,' 전자공학회논문지, 제45권, 제CI-5호, pp. 25-31, 2008   과학기술학회마을
7 M. S. Hwang, 'A remote password authentication scheme based on the digital signature method,' International Journal of Computer Mathematics, Vol. 70, pp. 657-666, 1999   DOI
8 W. H. Yang and S. P. Shieh, 'Password authentication schemes with smart cards,' Computers & Security, Vol. 18, no. 8, pp. 727-733, 1999   DOI   ScienceOn
9 H. Y. Chien, J. K. Jan, and Y. M. Tseng, 'A modified remote login authentication scheme based on geometric approach,' Journal of Systems and Software, Vol. 55, pp. 287-290, 2001   DOI   ScienceOn
10 M. S. Hwang, C. C. Lee, and Y. L. Tang, 'An improvement of SPLICE/AS in WIDE against guessing attack,' International Journal of Informatica, Vol. 12, no. 2, pp. 297-302, 2001
11 C. M. Chen and W. C. Ku, 'Stolen-verifier attack on two new strong-password authentication protocols,' IEICE Transactions on Communications, Vol. E85-B, no. 11, pp. 2519-2521, November 2002
12 C. W. Lin, C. S. Tasi, and M. S. Hwang, 'A new strong-password authentication scheme using one-way hash function,' Journal of Computer and Systems Sciences International, Vol. 45, no. 4, pp. 623-626, 2006   DOI   ScienceOn
13 이성운, 김현성, 유기영, '패스워드를 변경 가능한 효율적인 패스워드 기반의 인증된 키 교환 프로토콜,' 전자공학회논문지, 제42권, 제TC-2호, pp. 33-38, 2005   과학기술학회마을
14 M. Sandirigama, A. Shimizu, and M. T. Noda, 'Simple and secure password authentication protocol (sas). IEICE Transactions on Communications,' Vol. E83-B, no. 6, pp. 1363-1365, June 2000
15 C. L. Lin, H. M. Sun, and T. Hwang, 'Attacks and solutions on strong-password authentication,' IEICE Transactions on Communications, Vol. E84-B, no. 9, pp. 2622-2627, September 2001
16 L. H. Li, I. C. Lin, and M. S. Hwang, 'A remote password authentication scheme for multi-server architecture using neural networks,' IEEE Transactions on Neural Networks, Vol. 12, no. 6, pp. 1498-1504, 2001   DOI   ScienceOn
17 A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, 'Handbook of applied cryptography,' CRC Press, New York, 1997
18 C. C. Lee, L. H. Li, and M. S. Hwang, 'A remote user authentication scheme using hash functions,' ACM Operating Systems Review, Vol. 36, no. 4, pp. 23-29, 2002   DOI   ScienceOn
19 M. S. Hwang and L. H. Li, 'A new remote user authentication scheme using smart cards,' IEEE Transactions on Consumer Electronics, Vol. 46, no. 1, pp. 28-30, 2000   DOI   ScienceOn
20 B. Schneier, 'Applied cryptography protocols,' Algorithms and Source Code in C, 2nd edn. John Wiley, Chichester, 1995
21 권정호, 박종태, 'EEE 802.11 무선랜에서 고속 이동성 지원을 위한 사용자 사전 인증 기법,' 전자공학회논문지, 제44권, 제TC-10호, pp. 191-200, 2007
22 강명희, 유황빈, '유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델,' 전자공학회논문지, 제42권, 제CI-4호, pp. 25-32, 2005   과학기술학회마을
23 E. J. Yoon, E. K. Ryu, and K. Y. Yoo, 'Secure SE-OSPA protocol against DoS attack,' Proceeding of LSRC Summer Conference in Korean Institute of Information Scientists and Engineers, Vol. 2, no. 1, pp. 27-31, 2003
24 송영상, 신인철, '서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계,' 전자공학회논문지, 제41권, 제CI-4호, pp. 421-430, 2004   과학기술학회마을
25 C. C. Lee, M. S. Hwang, and W. P. Yang, 'A flexible remote user authentication scheme using smart cards,' ACM Operating Systems Review, Vol. 36, no. 3, pp. 46-52, 2002   DOI   ScienceOn
26 L. Lamport, 'Password authentication with insecure communication,' Communication of ACM, Vol. 24, pp. 770-772, 1981   DOI   ScienceOn